• Title/Summary/Keyword: Social Network service

Search Result 1,310, Processing Time 0.026 seconds

SAD : Web Session Anomaly Detection based on Bayesian Estimation (베이지언 추정을 이용한 웹 서비스 공격 탐지)

  • 조상현;김한성;이병희;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.115-125
    • /
    • 2003
  • As Web services are generally open for external uses and not filtered by Firewall, these result in attacker's target. Web attacks which exploit vulnerable web-applications and malicious users' requests cause economical and social problems. In this paper, we are modelling general web service usages based on user-web-session and detect anomal usages with Bayesian estimation method. Finally we propose SAD(Session Anomaly Detection) for detection unknown web attacks. To evaluate SAD, we made an experiment on attack simulation with web vulnerability scanner, whisker. The results show that the detection rate of SAD is over 90%, which is influenced by several features such as size of window or training set, detection filter method and web topology.

A Study on the Promotion of SNS for the Acquisition of Excellent Personnel in the Special Forces Non Officer (특전부사관 우수인력 획득을 위한 SNS 홍보에 관한 연구)

  • Kang, Dong Sik;Namkung, Seung Pil;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.275-280
    • /
    • 2021
  • This study began with the question of obtaining human resources through the promotion of outstanding resources of the Special Forces Officer and studied the following four promotion strategies: First, it is Facebook's promotional strategy medium. Second, it is a promotional strategy medium of YouTube. Third, it is a promotional strategy medium for blogs. Fourth, it is a public relations strategy medium for Web site. Furthermore, we would like to consider this study through four promotional strategies and cases of acquiring excellent foreign personnel in order to acquire excellent non-commissioned officers. Therefore, it is necessary to obtain excellent resources through promotional activities by utilizing strategic intermediaries for obtaining excellent resources from special forces. Ultimately, this study can provide fundamental implications for recruiting special forces officers for obtaining excellent resources by utilizing strategic intermediaries.

A Study on the Effect of Advertising by Generation on the Types of Tourist Attractions Posted on SNS (SNS에 게시된 관광지 사진유형에 따른 세대별 광고효과에 관한 연구)

  • Lim, Jae-Moon
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.71-77
    • /
    • 2021
  • This study aimed to suggest ways to utilize local governments' SNS by recognizing whether advertising affinity affects advertising effectiveness and significant differences between photo types (personality or absence) and generation. The survey was conducted from 1 April to 16 April 2021, and a total of 235 copies were used for empirical analysis. According to the analysis, advertising likeability affects advertising effects, and photos involving tourists have a greater impact on advertising effects in their 20s. This will require local governments to make various efforts to identify the generations that access SNS the most, and to encourage them to post photos suitable for that generation, along with ensuring that tourists' photos are posted at tourist attractions.

The Blockchain based Undeniable Multi-Signature Scheme for Protection of Multiple Authorship on Wisdom Contents (지혜콘텐츠 공동저작권 보호에 적합한 블록체인 기반 부인봉쇄 다중서명 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.2
    • /
    • pp.7-12
    • /
    • 2021
  • Wisdom Contents are created with experiences and ideas of multiple authors, and consumed in Internet based Social Network Services that are not subjected to regional restrictions. Existing copyright management systems are designed for the protection of professional authors' rights, and effective in domestic area. On the contrary, the blockchain protocol is subjected to the service and the block is added by the consensus of participating nodes. If the data is stored to the blockchain, it cannot be modified or deleted. In this paper, we propose the blockchain based undeniable multi-signature scheme for the protection of multiple authorship on Wizdom Contents. The proposed scheme is consisted of co-authors' common public key generation, multi-signature generation and verification protocols. In the undeniable signature scheme, the signature cannot be verified without help of the signer. The proposed scheme is best suited to the contents purchase protocol. All co-authors cannot deny the fairness of the automated profit distribution through the verification of multiple authorship on Wizdom Contents.

The Dynamics of Online word-of-mouth and Marketing Performance : Exploring Mobile Game Application Reviews (온라인 구전과 마케팅 성과의 다이나믹스 연구 : 모바일 게임 앱 리뷰를 중심으로)

  • Kim, In-kiw;Cha, Seong-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.36-48
    • /
    • 2020
  • App market has continuously been growth since its launch. The market revenues will reach about 1,000 billion US dollars in 2019. App is a core service for smartphone. Currently, there are more than 1.5 million mobile apps in App platform calling out for attention. So, if you are looking at developing a successful app, you need to have a solid marketing and distribution strategy. Online word of mouth(eWOM) is one of the most effective, powerful App marketing method. eWOM affect potential consumers' decision making, and this effect can spread rapidly through online social network. Despite the increasing research on word of mouth, only few studies have focused on content analysis. Most of studies focused on the causes and acceptance of eWOM and eWOM performance measurement. This study aims to content analysis of mobile apps review In 2013, Google researchers announced Word2Vec. This method has overcome the weakness of previous studies. This is faster and more accurate than traditional methods. This study found out the relationship between mobile app reviews and checked for reactions by Word2vec.

A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security (항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.16-22
    • /
    • 2023
  • Terrorists have been attacking in the vulnerable points of aviation sector with the diverse methods of attacks. Recently, Vulnerability is increasing because the Modus Operandi of Terrorism is carried out by exploitation of people in the form of employee working in aviation sector whose role provides them with privileged access to secured locations, secured items or security sensitive information. Furthermore, cases of insider threat are rising across the world with the phenomenon of personal radicalization through internet and social network service. The government of ROK must respond to insider threat could exploit to acts of unlawful interference and the security regulations should be established to prevent from insider threat in advance refer to the acts of unlawful interference carried out in foreign countries and the recommendations by USA, UK and ICAO.

Study on the Recognition and Purchase Status of Eco-Friendly Oral Hygiene Products

  • Su-min Jeon;Do-Seon Lim;Jae-kyeong Kim;Jae-ui Lee;Su-hyeon Lee;Seong-eun Park;Im-hee Jung
    • Journal of dental hygiene science
    • /
    • v.22 no.4
    • /
    • pp.241-248
    • /
    • 2022
  • Background: Plastic waste generates pollutants in the process of incineration or landfilling, and accumulates in water or marine organisms, causing adverse effects on the environment and the human body. Recently, various eco-friendly oral hygiene products (Eco-OHPs) such as bamboo toothbrushes and biodegradable plastic toothbrushes have been developed. Therefore, this study aimed to investigate the current level of awareness and purchasing status of eco-OHPs among adults who are interested in eco-friendly products. Methods: This study included adults aged >19 years who regularly visited eco-friendly shops and online sites; the online survey links were distributed during their visits to eco-friendly Internet cafés and companies. Of the 22 questions, seven assessed the participants' general characteristics, three assessed the general oral hygiene care products used, six assessed the level of awareness of Eco-OHPs, and six assessed the purchasing status of Eco-OHPs. Frequency analysis, chi-square test, and regression analysis were performed using SPSS software. Results: Among the respondents, 108 (51.4%) were aware of Eco-OHPs, and 79 (37.6%) had experience purchasing Eco-OHPs. The most common reason for not purchasing was the lack of information about related brands or products (74, 56.5%). The most common platform used in obtaining information was the Internet (general: 31.5%, eco-friendly: 46.3%), such as Social Network Service, Internet cafes, and blogs. The experience in purchasing Eco-OHPs was affected by whether the respondents recognized the possibility of contributing to environmental preservation, availability of vendors, product safety, and the number of eco-friendly products purchased. Conclusion: In order to expand the use of Eco-OHPs, various efforts such as promotion of eco-friendly characteristics, determination of related vendors, reliable analysis of product safety, and expansion of product experience opportunities are required.

Using Smart Phone and RFID Technology for making Ubiquitous Thema Park (스마트폰과 RFID를 이용한 u-테마파크 모델의 설계 및 구현)

  • Shin, Jae-myung;Kim, Doo-hyung;Ahn, Hongbum;Park, Sang-won;Hong, Jin-pyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1478-1481
    • /
    • 2010
  • 기존의 테마파크에 RFID를 이용하면 보다 편리하게 출입관리를 할 수 있고, 카드 한 장으로 테마파크 내에서 결제부터 부대시설과 서비스까지 이용할 수 있다. 이러한 모델은 이미 서브원 곤지암리조트 스키장과 캐리비언베이 워터파크 등 에서 도입하여 사용하고 있다[1][2]. 그러나 RFID를 이용한 유비쿼터스 모델들의 공통적인 단점은 RFID 카드 사용에 대한 피드백을 받을 수 없다는 것이다. 다시 말해서 RFID 카드에 대한 정보를 사용자는 모르기 때문에 자신이 RFID 카드로 무엇을 얼마나 결제했는지, 어떠한 서비스를 사용했는지 다시 확인할 수 없다는 문제점이 있다. 본 논문에서는 이러한 기존의 시스템에 스마트폰을 이용하여 사용자와 테마파크를 유기적으로 연결시켜줌으로써, 스마트폰을 통해 자신의 결제정보, 서비스 이용내역 등을 실시간으로 확인 가능할 수 있는 u-테마파크 모델을 제시한다. u-테마파크 모델을 이용하면 스마트폰을 통해 부대시설(놀이공원의 놀이기구, 스키장의 리프트 등)의 대기시간을 실시간으로 확인할 수 있고, RFID 카드를 소지한 일행의 위치를 찾을 수 있으며, 테마파크의 모든 이용객들과 정보를 교환할 수 있는 SNS(Social Network Service)등의 새로운 서비스를 제공할 수 있다. 테마파크 측에서는 실시간으로 취합되는 고객정보를 이용하여 이용률이 떨어지는 고객들의 특징을 파악해 해당 고객들에게 맞는 서비스를 제공하고 맞춤 마케팅을 하는 등의 체계적인 관리를 할 수 있어 다양한 마케팅과 새로운 서비스 제공이 가능하다는 이점이 있다.

Analysis of Performance of Creative Education based on Twitter Big Data Analysis (트위터 빅데이터 분석을 통한 창의적 교육의 성과요인 분석)

  • Joo, Kilhong
    • Journal of Creative Information Culture
    • /
    • v.5 no.3
    • /
    • pp.215-223
    • /
    • 2019
  • The wave of the information age gradually accelerates, and fusion analysis solutions that can utilize these knowledge data according to accumulation of various forms of big data such as large capacity texts, sounds, movies and the like are increasing, Reduction in the cost of storing data accordingly, development of social network service (SNS), etc. resulted in quantitative qualitative expansion of data. Such a situation makes possible utilization of data which was not trying to be existing, and the potential value and influence of the data are increasing. Research is being actively made to present future-oriented education systems by applying these fusion analysis systems to the improvement of the educational system. In this research, we conducted a big data analysis on Twitter, analyzed the natural language of the data and frequency analysis of the word, quantitative measure of how domestic windows education problems and outcomes were done in it as a solution.

A Study on the Security Threat Response in Smart Integrated Platforms (스마트 통합플랫폼 보안위협과 대응방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.129-134
    • /
    • 2022
  • A smart platform is defined as an evolved platform that realizes physical and virtual space into a hyper-connected environment by combining the existing platform and advanced IT technology. The hyper-connection that is the connection between information and information, infrastructure and infrastructure, infrastructure and information, or space and service, enables the realization and provision of high-quality services that significantly change the quality of life and environment of users. In addition, it is providing everyone with the effect of significantly improving the social safety net and personal health management level by implementing smart government and smart healthcare. A lot of information produced and consumed in these processes can act as a factor threatening the basic rights of the public and individuals by the informations themselves or through big data analysis. In particular, as the smart platform as a core function that forms the ecosystem of a smart city is naturally and continuously expanded, it faces a huge security burden in data processing and network operation. In this paper, platform components as core functions of smart city and appropriate security threats and countermeasures are studied.